Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack

被引:147
作者
Gao, Chong-zhi [1 ,2 ]
Cheng, Qiong [1 ]
He, Pei [1 ]
Susilo, Willy [3 ]
Li, Jin [1 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing, Peoples R China
[3] Univ Wollongong, Northfields Ave, Wollongong, NSW 2522, Australia
关键词
Naive Bayes classifier; Privacy-preserving; Substitution-then-comparison (STC) attack; EFFICIENT; PROTOCOL;
D O I
10.1016/j.ins.2018.02.058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Naive Bayes (NB) is a simple but highly practical classifier, with a wide range of applications including spam filters, cancer diagnosis and face recognition, to name a few examples only. Consider a situation where a user requests a classification service from a NB classifier server, both the user and the server do not want to reveal their private data to each other. This paper focuses on constructing a privacy-preserving NB classifier that is resistant to an easy-to-perform, but difficult-to-detect attack, which we call the substitution-then comparison (STC) attack. Without resorting to fully homomorphic encryptions, which has a high computational overhead, we propose a scheme which avoids information leakage under the STC attack. Our key technique involves the use of a "double-blinding" technique, and we show how to combine it with additively homomorphic encryptions and oblivious transfer to hide both parties' privacy. Furthermore, a completed evaluation shows that the construction is highly practical - most of the computations are in the server's offline phase, and the overhead of online computation and communication is small for both parties. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:72 / 88
页数:17
相关论文
共 57 条
[51]  
Sahami M, 1998, P WORKSH LEARN TEXT
[52]  
Shokri R, 2015, ANN ALLERTON CONF, P909, DOI 10.1109/ALLERTON.2015.7447103
[53]   Privacy-preserving Naive Bayes classification [J].
Vaidya, Jaideep ;
Kantarcioglu, Murat ;
Clifton, Chris .
VLDB JOURNAL, 2008, 17 (04) :879-898
[54]  
Veugen Thijs., 2011, COMP ENCRYPTED DATA
[55]  
Wright R, 2004, P 10 ACM SIGKDD INT, P713, DOI [DOI 10.1145/1014052.1014145., 10.1145/1014052.1014145, DOI 10.1145/1014052.1014145]
[56]  
Yao A. C., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P162, DOI 10.1109/SFCS.1986.25
[57]   Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing [J].
Zhang, Yinghui ;
Chen, Xiaofeng ;
Li, Jin ;
Wong, Duncan S. ;
Li, Hui ;
You, Ilsun .
INFORMATION SCIENCES, 2017, 379 :42-61